CN102681652A - Security input achieving method and terminal - Google Patents

Security input achieving method and terminal Download PDF

Info

Publication number
CN102681652A
CN102681652A CN201110056603XA CN201110056603A CN102681652A CN 102681652 A CN102681652 A CN 102681652A CN 201110056603X A CN201110056603X A CN 201110056603XA CN 201110056603 A CN201110056603 A CN 201110056603A CN 102681652 A CN102681652 A CN 102681652A
Authority
CN
China
Prior art keywords
input character
initial input
initial
terminal
input
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201110056603XA
Other languages
Chinese (zh)
Other versions
CN102681652B (en
Inventor
彭刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN201610108393.7A priority Critical patent/CN105808139B/en
Priority to CN201610107992.7A priority patent/CN105786181B/en
Priority to CN201110056603.XA priority patent/CN102681652B/en
Publication of CN102681652A publication Critical patent/CN102681652A/en
Application granted granted Critical
Publication of CN102681652B publication Critical patent/CN102681652B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • G06F3/04883Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures for inputting data by handwriting, e.g. gesture or text
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/83Protecting input, output or interconnection devices input devices, e.g. keyboards, mice or controllers thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

An embodiment of the invention provides a security input achieving method and a terminal. The security input achieving method is applied to the terminal with a display screen, and the terminal comprises a first application program. The security input achieving method includes: obtaining input initial input characters, and displaying the initial input characters in an input frame; identifying input mode for inputting the initial input characters; determining effective input characters corresponding to the initial input characters according to the input mode and a preset instruction security policy; and supplying the effective input characters to the first application program. The security input achieving method identifies and converts the initial input characters to effective instructions through the instruction security policy so that a user can input various privacy information and security information on the terminal safely without scruple of bystanders in complicated environment, and security of the privacy information and the security information is effectively guaranteed.

Description

A kind of implementation method and terminal of safety input
Technical field
The present invention relates to electronic applications, be meant a kind of implementation method and terminal of safety input especially.
Background technology
Along with popularizing of intelligent handheld device and enriching constantly of application, the user can also be by intelligent handheld device browse network, shopping, financing except can communicating by these equipment.When using many application, need verify all promptly, need user's input validation information, for example, password etc. are so that whether the identity of judges is legal to user's identity; In addition, the user possibly need input comparatively crucial or belong to the information of individual privacy in the process that use is directed against equally.
When user's input validation information, comparatively crucial or when belonging to the information of individual privacy; Often need confirm the content of input; Therefore the terminal is necessary the content of user's input is shown; Will cause other people illegally to spy on and steal the information of user's input like this, cause user's interests to suffer damage.
Therefore, the problem that the information that in correlation technique, is difficult to avoid the user to import is illegally stolen still, does not propose effective solution to existing issue at present as yet.
Summary of the invention
The technical matters that the present invention will solve provides a kind of implementation method and terminal of safety input, is used for solving prior art, on a terminal in the process of input corresponding information, and the defective that is difficult to avoid the information imported illegally to be stolen.
For solving the problems of the technologies described above; Embodiments of the invention provide a kind of implementation method of safety input, be applied to one have a display screen the terminal, said terminal comprises first application program; Comprise: obtain the initial input character of input, said initial input character is presented in the input frame; The input mode of the said initial input character of identification input; Based on said input mode and predetermined instruction secure strategy, confirm effective input character that said initial input character is corresponding; Said effective input character is offered said first application program.
In the described implementation method; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; The state of INC when detecting this initial input character of input; When said INC was in running order, the signal that this initial input character is corresponding carried out after increment or the decrement the effective input character as correspondence.
In the described implementation method; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
In the described implementation method, the coupling capacitance situation of change at said terminal during according to each initial input character of input, the dynamics or the contact area of definite this initial input character of input.
In the described implementation method; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; Dynamics when detecting this initial input character of input; When detected dynamics satisfies predetermined dynamics threshold range, be effective input character with said initial input character recognition.
In the described implementation method; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; Distance when detecting this initial input character of input between the touch-screen at contactant and said terminal; When said distance satisfies the distance threshold scope, be corresponding effective input character with this initial input character recognition.
A kind of terminal comprises: first application program module is used to obtain effective input character; Load module has input frame, is used to the initial input character that obtains to import, and said initial input character is presented in the said input frame; The input mode acquisition module is used to discern the input mode of importing said initial input character; Identification module is used for confirming effective input character that said initial input character is corresponding based on said input mode and predetermined instruction secure strategy; Said effective input character is offered said first application program module.
In the described terminal; Also comprise: the incremental detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input when said contact area satisfies the area threshold scope, is corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
In the described terminal; Also comprise: the contact area detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input when said contact area satisfies the area threshold scope, is corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
In the described terminal; Also comprise: the dynamics detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input when said contact area satisfies the area threshold scope, is corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character; The distance detecting module; Be used for for each said initial input character; Distance when detecting this initial input character of input between the touch-screen at contactant and said terminal when said distance satisfies the distance threshold scope, is corresponding effective input character with this initial input character recognition.
Use the technical scheme that the embodiment of the invention provides; Adopt the instruction secure strategy that the formation effective instruction is discerned and changed to the initial input character of input; Make the user under the situation of circumstance complication, need not scruple the onlooker and can be on the terminal the various privacy informations of input and the security information of safety, guaranteed the security of privacy information and security information effectively.
Description of drawings
Fig. 1 is the implementation method schematic flow sheet of a kind of safety input of the embodiment of the invention;
Fig. 2 realizes the intelligent handset structure synoptic diagram of safety input for the embodiment of the invention;
Fig. 3 has the terminal works schematic flow sheet of capacitive touch screen for the embodiment of the invention;
Fig. 4 is an embodiment of the invention terminal structure synoptic diagram.
Embodiment
For technical matters, technical scheme and advantage that the present invention will be solved is clearer, will combine accompanying drawing and specific embodiment to be described in detail below.
The embodiment of the invention provides a kind of implementation method of safety input, be applied to one have a display screen the terminal, said terminal comprises first application program, and is as shown in Figure 1, comprising:
Step 101, the initial input character of acquisition input is presented at said initial input character in the input frame;
Step 102, the input mode of the said initial input character of identification input;
Step 103 based on said input mode and predetermined instruction secure strategy, is confirmed effective input character that said initial input character is corresponding;
Said effective input character is offered said first application program.
Use the technological means that the embodiment of the invention provides; Adopt the instruction secure strategy that the formation effective instruction is discerned and changed to the initial input character of input; Make the user under the situation of circumstance complication, need not scruple the onlooker and can be on the terminal the various privacy informations of input and the security information of safety, guaranteed the security of privacy information and security information effectively.
In the technology that embodiment provided, predetermined instruction secure strategy is a service logic; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; The state of INC when detecting this initial input character of input; When said INC was in running order, the signal that this initial input character is corresponding carried out after increment or the decrement the effective input character as correspondence.When the user imports the initial input character; If the user imports under the situation that activates specific input mode; Then the terminal is discerned the initial input character of input according to predetermined instruction secure strategy, comprising: each the initial input character in the initial input character of under the situation that activates specific input mode, importing for the user is all carried out particular procedure to confirm the character of the actual input of user.Wherein, specific input mode comprise following one of at least: addition process, subtraction process.
In the application scenarios of correspondence; The terminal is specially intelligent handheld device, in using intelligent handheld device process, is positioned at the screen back side and is blocked as the part finger of contactant; Add a touch-screen or button at the intelligent handheld device back side; Specifically as shown in Figure 2, the behind of intelligent handheld device touch-screen has the plastics paster, the plastics paster is carried out subregion form the profile of bunge bedstraw herb-have five to touch parts; Can pass through each touch particular location partly of the touch perception bunge bedstraw herb of finger.In the service logic of intelligent handheld device, service logic can touch part and define respectively to five of touch-screen: the circular touch area length of middle is shown by 3 stopwatches will import secret information, and four touch areas all around can be provided with the desired different increments of user respectively: first incremental area; Be used to be provided with increment and add 1, the second incremental area, be used to be provided with increment and add 0; The 3rd incremental area; Be used to be provided with increment and add 2, the four incremental area, be used to be provided with increment and subtract 1.
When needs guarantee the information in first application program at terminal, input-when for example account No. or password etc. are not stolen, the predefine zone that can make the forefinger at the screen back side click this touch-screen or button realizes the initial input character of input is carried out auto-increment.With the effective input character 5321b of input in first application program at terminal is example; For preventing that effective input character is stolen; Pin circular touch area with the head of a household and continue 3 seconds to activate concealed input function; And when input initial input character, adopt different input modes to import, comprising each character:
Step a during input initial input character 6, clicks the 4th incremental area, because the increment that the 4th incremental area is carried out the initial input character is for subtracting one, therefore effective input character of obtaining of correspondence is 5;
Step b, any incremental area do not clicked in input initial input character 5;
Step c, any incremental area do not clicked in input initial input character 4;
Steps d during input initial input character 3, is clicked second incremental area, and the then corresponding effective input character that obtains is 3;
Step e during input initial input character 2, clicks second incremental area, and the then corresponding effective input character that obtains is 2;
Step f, any incremental area do not clicked in input initial input character 1;
Step g during input initial input character 0, is clicked first incremental area, because the increment that first incremental area is carried out the initial input character is for adding one, then effective input character of obtaining of correspondence is 1;
Step h during input initial input character a, clicks first incremental area, because the increment that first incremental area is carried out the initial input character is for adding one, then effective input character of obtaining of correspondence is b.
In the process of each initial input character of above-mentioned input; Input mode when importing each initial input character is different, can know according to the instruction secure strategy again, and the initial input character is added that clicking some incremental area-realization carries out increment to the initial input character; Then can form effective input character; That does not click incremental area during input initial input character can't be identified as effective input character, and the effective input character that therefore finally obtains is 5321b, can be carried out by intelligent handheld device.
Use the technical scheme that is provided; Can protect secret information more easily; And because the number of times of application such as the Internet bank, concealed phone is not very frequent, thereby can on intelligent handheld device, can realize the low and easy realization of cost through increasing a common touch-screen.When need to be keep secret, use each incremental area of bunge bedstraw herb touch-screen to carry out hidden add one and subtracting first-class incremental computations.On intelligent handheld device, use this technical scheme, make the mode of operation of the customized adopted touch-screen of intelligent handheld device, better with the product design fusion and have better security performance.
In the technology that embodiment provided, the coupling capacitance situation of change at said terminal during according to each initial input character of input, the dynamics or the contact area of definite this initial input character of input.Predetermined instruction secure strategy is a service logic; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.The terminal is specially the mobile phone of intelligent communication device-for example, and as shown in Figure 3, based on the touch-screen that can detect the face contact area, the course of work of intelligent communication device comprises:
Step 301, in the time of need inputing private information such as password as the user, can grow by or double-click mode such as intelligent communication device left side volume key, activate the pairing service logic of input secret information, the running background that this service logic is established in intelligence communication.
Step 302, activate this service logic after, through normal click touch-screen input initial input character, and predetermined instruction secure strategy this is input as the initial input character through the vibrations prompting; The user slightly firmly clicks touch-screen to increase contact area, can import idle character, and this moment, this idle character still was presented on the touch-screen but vibrations prompting; Because vibrations can't be by other people's perception, thereby makes the peeper can't know the effective input character that is comprised in the initial input character of input.
Wherein, receive effective input character by first application program.
Step 303, length can be closed the pairing service logic of input secret information by perhaps double-clicking the intelligent communication device side switch, and effective input character is all imported in the click of the different dynamics after closing.First application program is closed in the suitable moment by user's decision.
In the application scenarios of correspondence; Need in first application program at terminal, import effective input character 5321; For preventing that effective input character is stolen; The user starts the instruction secure strategy that the terminal has, and when input initial input character, adopts different input modes to import to each character, comprising:
A, during input initial input character 6, the contact area between the touch-screen at contactant and said terminal does not satisfy the area threshold scope;
B, during input initial input character 5, the contact area between the touch-screen at contactant and said terminal satisfies the area threshold scope;
C, during input initial input character 4, the contact area between the touch-screen at contactant and said terminal does not satisfy the area threshold scope;
D, during input initial input character 3, the contact area between the touch-screen at contactant and said terminal satisfies the area threshold scope;
E, during input initial input character 2, the contact area between the touch-screen at contactant and said terminal satisfies the area threshold scope;
F, during input initial input character 1, the contact area between the touch-screen at contactant and said terminal satisfies the area threshold scope.
In the process of each initial input character of above-mentioned input; Input mode when importing each initial input character is different; Can know according to the instruction secure strategy again; When the contact area between the touch-screen at contactant and terminal satisfies the area threshold scope, can be corresponding effective input character with the initial input character recognition; When the contact area between the touch-screen at contactant and terminal can not satisfy the area threshold scope, can't be corresponding effective input character with the initial input character recognition, the effective input character that therefore finally obtains is 5321.
In the technology that another embodiment provided, predetermined instruction secure strategy is a service logic; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; Dynamics when detecting this initial input character of input; When detected dynamics satisfies predetermined dynamics threshold range, be effective input character with said initial input character recognition.
Based on the technical scheme that is provided, the coupling capacitance situation of change at said terminal during according to each initial input character of input, the dynamics or the contact area of definite this initial input character of input.Capacitive touch screen can be adopted in the terminal, and the capacitive touch screen structure comprises: the thin-film body layer of plating layer of transparent adds the lastblock cover glass at conductor layer again as conductor layer on a glass screen, and conductor layer and inductor can be thoroughly protected in two glass designs.All be coated with long and narrow electrode on touch-screen four limits, in electric conductor, form a low-voltage AC field.When touch screen; Because there is electric field in human body; Can form a coupling capacitance between finger and conductor layer, the electric current that four limit electrodes send can flow to the contact, is directly proportional with the distance of pointing four limit electrodes and electric current is strong and weak; Be positioned at ratio and power that controller after the touch screen can calculate electric current, accurately calculate touch point position.Two glass of capacitance touch screen can be protected conductor layer and inductor, prevent that effectively the external environment factor from impacting touch-screen, even screen speckles with filth, dust or oil stain, capacitive touch screen still can accurately be calculated touch location.Resistive touch screen also can be adopted in the terminal, and resistive touch screen is a kind of sensor, and (X, physical location Y) convert the voltage of representing X coordinate and Y coordinate into touch point in the rectangular area for it.A lot of LCD modules have all adopted resistive touch screen, and this screen can produce the screen bias voltage with four lines, five lines, seven lines or eight lines, the voltage of the touch point of reading back simultaneously.Resistive touch screen is the structure that film adds upper glass basically, all scribbles nano indium tin metal oxide (ITO) coating on the adjacent one side of film and glass, and ITO has the good electric conductivity and the transparency.When touch operation, the ITO of film lower floor can touch the ITO on glass upper strata, spreads out of corresponding electric signal via inductor; Deliver to processor through change-over circuit; Be converted into X, Y value on the screen through computing, and accomplish the action that clicks, and be presented on the screen.Promptly; Touch-screen comprises two superimposed hyaline layers up and down; Four lines and eight line touch-screens are made up of two-layer transparent resistive material with similar face resistance, and five lines and seven line touch-screens are made up of a resistive layer and a conductive layer, also will separate two-layer with a kind of resilient material usually.When the pressure (as pushing through nib or finger) that receives when touch screen surface is enough big, can produces between top layer and the bottom and contact.All resistive touch screens all adopt the voltage divider principle to produce to represent the voltage of X coordinate and Y coordinate; Through being connected, two resistance realize voltage divider; Resistance (R1) connects reference voltage (VREF); Resistance (R2) ground connection, the voltage measuring value at two resistance tie point places is directly proportional with the resistance of following that resistance.
In the application scenarios of correspondence; Need in first application program at terminal, import effective input character 5321; For preventing that effective input character is stolen; The user starts the instruction secure strategy that the terminal has, and when input initial input character, adopts different input modes to import to each character, comprising:
A, during input initial input character 6, the dynamics between the touch-screen at contactant and said terminal does not satisfy the dynamics threshold range;
B, during input initial input character 5, the dynamics between the touch-screen at contactant and said terminal satisfies the dynamics threshold range;
C, during input initial input character 4, the dynamics between the touch-screen at contactant and said terminal does not satisfy the dynamics threshold range;
D, during input initial input character 3, the dynamics between the touch-screen at contactant and said terminal satisfies the dynamics threshold range;
E, during input initial input character 2, the dynamics between the touch-screen at contactant and said terminal satisfies the dynamics threshold range;
F, during input initial input character 1, the dynamics between the touch-screen at contactant and said terminal satisfies the dynamics threshold range.
In the process of each initial input character of above-mentioned input; Input mode when importing each initial input character is different; Can know according to the instruction secure strategy again; When the dynamics between the touch-screen at contactant and terminal satisfies the dynamics threshold range, can be corresponding effective input character with the initial input character recognition; When the dynamics between the touch-screen at contactant and terminal can not satisfy the dynamics threshold range, can't be corresponding effective input character with the initial input character recognition, the effective input character that therefore finally obtains is 5321.Because the dynamics of pushing of touch-screen is difficult to found by other people, and the slight vibrations prompting in terminal especially can't be by stranger's perception, and first application program can be positioned at the running background at terminal, therefore can guarantee the secret information that can not be stolen in the input process.
Among another embodiment, predetermined instruction secure strategy is a service logic; Confirm that the corresponding effective input character of said initial input character comprises: for each said initial input character; Distance when detecting this initial input character of input between the touch-screen at contactant and said terminal; When said distance satisfies the distance threshold scope, be corresponding effective input character with this initial input character recognition.The finger that touch-screen among the embodiment can be responded to as contactant is positioned at the point on the touch-screen, simultaneously can also be as finger operation in the preset distance above touch-screen of contactant.Pairing subpoint also can be by its position of said touch-screen perception on touch-screen for the contactant of this touch-screen top, and the position of this subpoint representes that contactant operates this position.For each initial input character; The area of subpoint when detecting this initial input character of input; Because this area and contactant are inversely proportional to the distance between the touch-screen at said terminal, therefore can calculate the distance between the touch-screen at contactant and said terminal according to this inverse relation: when contactant arrive between the touch-screen at said terminal apart from increasing the time, the area of subpoint reduces; When the distance of contactant between the touch-screen at said terminal reduced, the area of subpoint strengthened.Inverse relation is carried out quantitative Analysis, and the distance when obtaining this initial input character of input between the touch-screen at contactant and said terminal when said distance satisfies the distance threshold scope, is corresponding effective input character with this initial input character recognition.
In the application scenarios of correspondence; Need in first application program at terminal, import effective input character 5321; For preventing that effective input character is stolen; The user starts the instruction secure strategy that the terminal has, and when input initial input character, adopts different input modes to import to each character, comprising:
A, during input initial input character 6, the distance between the touch-screen at contactant and said terminal does not satisfy the distance threshold scope;
B, during input initial input character 5, the distance between the touch-screen at contactant and said terminal satisfies the distance threshold scope;
C, during input initial input character 4, the distance between the touch-screen at contactant and said terminal does not satisfy the distance threshold scope;
D, during input initial input character 3, the distance between the touch-screen at contactant and said terminal satisfies the distance threshold scope;
E, during input initial input character 2, the distance between the touch-screen at contactant and said terminal satisfies the distance threshold scope;
F, during input initial input character 1, the distance between the touch-screen at contactant and said terminal satisfies the distance threshold scope.
In the process of each initial input character of above-mentioned input; Input mode when importing each initial input character is different; Can know according to the instruction secure strategy again; When the distance between the touch-screen at contactant and said terminal satisfies the distance threshold scope, can be corresponding effective input character with the initial input character recognition; When the distance between the touch-screen at contactant and said terminal does not satisfy the distance threshold scope, can't be corresponding effective input character with the initial input character recognition, the effective input character that therefore finally obtains is 5321.
Corresponding, the embodiment of the invention provides a kind of terminal, and is as shown in Figure 4, comprising:
First application program module 401 is used to obtain effective input character;
Load module 402 has input frame, is used to the initial input character that obtains to import, and said initial input character is presented in the said input frame;
Input mode acquisition module 403 is used to discern the input mode of importing said initial input character;
Identification module 404 is used for confirming effective input character that said initial input character is corresponding based on said input mode and predetermined instruction secure strategy; Said effective input character is offered said first application program module 401.
Use the technological means that the embodiment of the invention provides; Adopt the instruction secure strategy that the formation effective instruction is discerned and changed to the initial input character of input; Make the user under the situation of circumstance complication, need not scruple the onlooker and can be on the terminal the various privacy informations of input and the security information of safety, guaranteed the security of privacy information and security information effectively.
Also comprise in the terminal:
The incremental detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
The contact area detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
The dynamics detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character;
The distance detecting module; Be used for for each said initial input character; Distance when detecting this initial input character of input between the touch-screen at contactant and said terminal when said distance satisfies the distance threshold scope, is corresponding effective input character with this initial input character recognition.
The above is merely preferred embodiment of the present invention, and is in order to restriction the present invention, not all within spirit of the present invention and principle, any modification of being done, is equal to replacement, improvement etc., all should be included within protection scope of the present invention.

Claims (10)

1. the implementation method of a safety input, be applied to one have a display screen the terminal, said terminal comprises first application program, it is characterized in that, comprising:
Obtain the initial input character of input, said initial input character is presented in the input frame;
The input mode of the said initial input character of identification input;
Based on said input mode and predetermined instruction secure strategy, confirm effective input character that said initial input character is corresponding;
Said effective input character is offered said first application program.
2. implementation method according to claim 1 is characterized in that, confirms that the corresponding effective input character of said initial input character comprises:
For each said initial input character, the state of INC when detecting this initial input character of input, when said INC was in running order, the signal that this initial input character is corresponding carried out after increment or the decrement the effective input character as correspondence.
3. implementation method according to claim 1 is characterized in that, confirms that the corresponding effective input character of said initial input character comprises:
For each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition;
Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
4. according to claim 2 or 3 described implementation methods, it is characterized in that the coupling capacitance situation of change at said terminal during according to each initial input character of input, the dynamics or the contact area of definite this initial input character of input.
5. implementation method according to claim 1 is characterized in that, confirms that the corresponding effective input character of said initial input character comprises:
For each said initial input character, the dynamics when detecting this initial input character of input when detected dynamics satisfies predetermined dynamics threshold range, is effective input character with said initial input character recognition.
6. implementation method according to claim 1 is characterized in that, confirms that the corresponding effective input character of said initial input character comprises:
For each said initial input character, the distance when detecting this initial input character of input between the touch-screen at contactant and said terminal when said distance satisfies the distance threshold scope, is corresponding effective input character with this initial input character recognition.
7. a terminal is characterized in that, comprising:
First application program module is used to obtain effective input character;
Load module has input frame, is used to the initial input character that obtains to import, and said initial input character is presented in the said input frame;
The input mode acquisition module is used to discern the input mode of importing said initial input character;
Identification module is used for confirming effective input character that said initial input character is corresponding based on said input mode and predetermined instruction secure strategy; Said effective input character is offered said first application program module.
8. terminal according to claim 7 is characterized in that, also comprises:
The incremental detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
9. terminal according to claim 7 is characterized in that, also comprises:
The contact area detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character.
10. terminal according to claim 7 is characterized in that, also comprises:
The dynamics detection module; Be used for for each said initial input character; The contact area that forms between the touch-screen at contactant and said terminal when detecting this initial input character of input; When said contact area satisfies the area threshold scope, be corresponding effective input character with this initial input character recognition; Wherein, through utilizing said contactant on the touch-screen at terminal, to import said initial input character;
The distance detecting module; Be used for for each said initial input character; Distance when detecting this initial input character of input between the touch-screen at contactant and said terminal when said distance satisfies the distance threshold scope, is corresponding effective input character with this initial input character recognition.
CN201110056603.XA 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal Active CN102681652B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN201610108393.7A CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely
CN201610107992.7A CN105786181B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely
CN201110056603.XA CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110056603.XA CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN201610107992.7A Division CN105786181B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely
CN201610108393.7A Division CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely

Publications (2)

Publication Number Publication Date
CN102681652A true CN102681652A (en) 2012-09-19
CN102681652B CN102681652B (en) 2016-03-30

Family

ID=46813699

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201610108393.7A Active CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely
CN201110056603.XA Active CN102681652B (en) 2011-03-09 2011-03-09 A kind of implementation method of safety input and terminal

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201610108393.7A Active CN105808139B (en) 2011-03-09 2011-03-09 A kind of implementation method and terminal inputted safely

Country Status (1)

Country Link
CN (2) CN105808139B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182679A (en) * 2014-08-21 2014-12-03 广东欧珀移动通信有限公司 Character inputting method and character inputting device for mobile terminal
CN104598786A (en) * 2015-01-20 2015-05-06 广东欧珀移动通信有限公司 Password inputting method and device
CN104915612A (en) * 2015-06-05 2015-09-16 飞天诚信科技股份有限公司 Implementation method for safely inputting information and system
CN105426100A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Pressure sensor based password input method and apparatus
CN107077598A (en) * 2014-09-12 2017-08-18 微软技术许可有限责任公司 Video with secret protection is caught
WO2020150984A1 (en) * 2019-01-25 2020-07-30 深圳市汇顶科技股份有限公司 Contact area calculating method and apparatus, touch chip, and electronic device

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808139B (en) * 2011-03-09 2019-02-05 联想(北京)有限公司 A kind of implementation method and terminal inputted safely

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333495A (en) * 2001-04-15 2002-01-30 黄银 Hidden safety cipher
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system
WO2010105249A1 (en) * 2009-03-13 2010-09-16 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105808139B (en) * 2011-03-09 2019-02-05 联想(北京)有限公司 A kind of implementation method and terminal inputted safely

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1333495A (en) * 2001-04-15 2002-01-30 黄银 Hidden safety cipher
WO2010105249A1 (en) * 2009-03-13 2010-09-16 Rutgers, The State University Of New Jersey Systems and methods for the detection of malware
CN201467167U (en) * 2009-08-07 2010-05-12 薛明 Password encoder and password protection system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104182679A (en) * 2014-08-21 2014-12-03 广东欧珀移动通信有限公司 Character inputting method and character inputting device for mobile terminal
CN107077598A (en) * 2014-09-12 2017-08-18 微软技术许可有限责任公司 Video with secret protection is caught
US10602054B2 (en) 2014-09-12 2020-03-24 Microsoft Technology Licensing, Llc Video capture with privacy safeguard
CN107077598B (en) * 2014-09-12 2020-10-27 微软技术许可有限责任公司 Video capture with privacy protection
CN104598786A (en) * 2015-01-20 2015-05-06 广东欧珀移动通信有限公司 Password inputting method and device
CN104598786B (en) * 2015-01-20 2017-12-15 广东欧珀移动通信有限公司 A kind of cipher-code input method and device
CN104915612A (en) * 2015-06-05 2015-09-16 飞天诚信科技股份有限公司 Implementation method for safely inputting information and system
CN104915612B (en) * 2015-06-05 2017-09-26 飞天诚信科技股份有限公司 A kind of realization method and system of safely inputting information
CN105426100A (en) * 2015-10-30 2016-03-23 努比亚技术有限公司 Pressure sensor based password input method and apparatus
WO2020150984A1 (en) * 2019-01-25 2020-07-30 深圳市汇顶科技股份有限公司 Contact area calculating method and apparatus, touch chip, and electronic device
CN111742285A (en) * 2019-01-25 2020-10-02 深圳市汇顶科技股份有限公司 Contact area calculation method and device, touch chip and electronic equipment

Also Published As

Publication number Publication date
CN105808139A (en) 2016-07-27
CN105808139B (en) 2019-02-05
CN102681652B (en) 2016-03-30

Similar Documents

Publication Publication Date Title
CN102681652B (en) A kind of implementation method of safety input and terminal
CN1906641B (en) Touch screen apparatus and method therefor
CN102402356B (en) There is the display unit and the electronic unit that touch measuring ability
CN103941946B (en) Touch screen and display device
CN1307528C (en) Digital resistance touch board and manufacturing method thereof
CN104866225B (en) A kind of electronic equipment and its control method with touch display screen
CN105122191A (en) Disambiguation of touch input events on a touch sensor panel
CN103513869A (en) Method and device for displaying terminal lock screen interface and Widget
CN102736854A (en) Mobile communication terminal and screen regulation method based on mobile communication terminal
CN106548125A (en) Multi-finger fingerprint identification device, multi-finger fingerprint identification electronic device and operation method
CN105279477A (en) Electronic device having fingerprint sensing function and call method of application program thereof
CN105335686A (en) Electronic apparatus possessing fingerprint sensing function and calling method of application program
US9329740B2 (en) Method of recognizing touch
CN103970357B (en) Electronic device and touch point judgment method
CN104571760B (en) Panel and its position of touch detection method with touch controllable function
CN105786181B (en) A kind of implementation method and terminal inputted safely
CN208622074U (en) Mobile-payment system and its screen construction based on fingerprint recognition
CN208506771U (en) Mobile-payment system and its non-visible area domain structure based on fingerprint recognition
CN207851794U (en) Capacitive touch screen with automatic temperature drift compensation function
CN208506805U (en) Mobile-payment system and its pressure sensitive module based on fingerprint recognition
CN208622118U (en) Mobile-payment system and its fingerprint identification unit based on fingerprint recognition
CN105320906A (en) Information safety protecting method and device for mobile terminal
CN104317434A (en) Touch screen security protection device, electronic equipment and touch screen of electronic equipment
CN205302217U (en) Touch mouse
CN203397334U (en) Shielded-type capacitive touch screen panel

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant